首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   642篇
  免费   35篇
  2023年   3篇
  2022年   5篇
  2021年   3篇
  2020年   12篇
  2019年   13篇
  2018年   10篇
  2017年   9篇
  2016年   24篇
  2015年   21篇
  2014年   19篇
  2013年   67篇
  2012年   35篇
  2011年   38篇
  2010年   25篇
  2009年   22篇
  2008年   44篇
  2007年   32篇
  2006年   32篇
  2005年   23篇
  2004年   26篇
  2003年   28篇
  2002年   26篇
  2001年   18篇
  2000年   4篇
  1999年   9篇
  1998年   9篇
  1997年   7篇
  1996年   7篇
  1995年   6篇
  1994年   5篇
  1992年   7篇
  1991年   4篇
  1990年   8篇
  1989年   5篇
  1987年   5篇
  1986年   6篇
  1985年   4篇
  1984年   3篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   3篇
  1978年   3篇
  1971年   2篇
  1969年   3篇
  1967年   3篇
  1966年   3篇
  1965年   3篇
  1964年   3篇
  1962年   2篇
排序方式: 共有677条查询结果,搜索用时 515 毫秒
241.
Starting from the fundamental ethical principles of medicine, the different forms of abuse in psychotherapy are described and discussed in the context of particular case studies. Besides sexual abuse, also the more subtle violations of basic ethical principles are taken into consideration. These include especially orally-exploitative forms of abuse, therapists’ improper acting-out of their own desires for close attachment or dominance conflicts, and narcissictic abuse. Finally, a particular type of narcissistic abuse is dealt with: the over-emphasis on the therapist’s own therapeutic method, with a tendency to dismiss alternative treatment strategies that might be more appropriate for the individual patient.  相似文献   
242.
This paper presents an exploratory study of the spontaneous production of 11 French children clinically diagnosed as specific language impaired (SLI). In a cross‐sectional study of the children under and over 5 years of age, we investigate the production of finite and non‐finite verbal forms, of sentences with overt and null subjects, and of pronominal clitics. A comparison between younger and older children with SLI highlights developmental patterns which parallel normal syntactic development in important respects, though at a slower pace. An area of difficulty which clearly persists for the older group involves the domain of pronominal complement clitics.  相似文献   
243.
244.
245.
Essentialism is, on the one hand, anchored with considerable firmness in a common sense picture of the world. On the other hand, it was dismissed for logico-philosophical reasons by a scientifically minded theorist like Quine. ``New essentialists' like Kripke did engage in very profitable theorizing on an essentialist basis, but made no significant effort to investigate the prospects of imparting to an essentialist metaphysics a solid foundation within a scientific world view. These foundational prospects are the concern of the article. – The investigation is guided by two ideas which are elaborated within a proof theoretical framework in the course of the article. First, being an essential F (where ``F' represents a predicate) is linked with a lifelong possession of the property signified by ``F' (but there is something more in it). Second, a special kind of necessity is involved in (true) predications of essential F-ness; it should be capable, like possibly all kinds of necessity, of being spelt out, in the final analysis, in terms of the provability of appropriate propositions in appropriate theoretical systems. In outlining the relevant axiomatic bases, the article draws on an early paper by E. Hirsch on individuation and essence.  相似文献   
246.
Ulrich Meyer 《Analysis》2002,62(276):305-308
  相似文献   
247.
Recent evidence suggests substantial response-time costs associated with lag-2 repetitions of tasks within explicitly controlled task sequences [Koch, I., Philipp, A. M., Gade, M. (2006). Chunking in task sequences modulates task inhibition. Psychological Science, 17, 346-350; Schneider, D. W. (2007). Task-set inhibition in chunked task sequences. Psychonomic Bulletin & Review, 14, 970-976], a result that has been interpreted as inhibition of no-longer relevant tasks. Experiments 1-3 confirm much larger lag-2 costs under serial-control than under externally cued conditions, but also show (a) that these costs occur only when sequences contain at least two distinct chunks and (b) that direct lag-2 repetitions are not a necessary condition for their occurrence. This pattern suggests the hypothesis that rather than task-set inhibition, the large lag-2 costs observed in complex sequences, reflect interference resulting from links between positions within a sequential plan and the individual tasks controlled by this plan. The remaining experiments successfully test this hypothesis (Experiment 4), rule out chaining accounts as a potential alternative explanation (Experiment 5), and demonstrate that interference results from information stored in long-term memory rather than working memory (Experiment 6). Implications of these results for an integration of models of serial-order control and serial memory are discussed.  相似文献   
248.
To explain differences in women's endorsement of sexist beliefs, we introduce the gender identity model (GIM). Based on social identity theory (SIT) and social role theory (SRT), we combine strength of gender identification and identity content and propose that different types of gender identity can be distinguished, which are predicted to relate to different levels of women's endorsement of sexist beliefs and engagement in collective action. Results of a correlational study and two experiments support the assumptions of the model: women reject Benevolent (BS), Hostile (HS), and Modern Sexisms (MS) and participate in collective action in particular when they are highly identified with the category women and have, at the same time, internalized progressive identity contents. In contrast, gender role preference has weaker or no effects on sexist beliefs and collective action when women are low identified with their gender in‐group. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
249.
In the introduction to this special issue, we discuss the development of Wittgenstein's thought, distinguish what we take to be well-travelled versus less well-travelled aspects of his philosophy of psychological phenomena and summarize the diverse contributions to this collection. In order to do so, we briefly discuss the extent to which his writings themselves can properly serve as a basis for psychological theory and method.  相似文献   
250.
Early release, temporary absence, and minimum security confinement have been permitted less often in German prisons in recent years. There are several reasons and indications that sexual offenders are particularly affected by these developments. Prison files and recidivism data of 115 adult sexual offenders who had been in a Lower Saxony prison in the mid-1990s were analyzed for the current study to find out whether this group posed a specific risk when permitted temporary absence or minimum security confinement. It was also considered whether temporary absence and minimum security confinement were related to reduced recidivism after release. The average follow-up interval was 8.5 years. The following findings emerged: First, 50.9% were reconvicted for any offence, 21.3% with an aggressive offence, and only 7.4% were reconvicted with a sexual offence. Every fifth (19.4%) was sentenced to another prison term or had another probation term revoked. Second, rule-breaking and criminal activity by sex offenders during minimum confinement or temporary absence were very rare and of low severity. Third, sexual offenders in minimum security confinement were less likely to recidivate than others on all measures of reoffending. With Cox regression analyses that controlled for important risk factors for recidivism it was found that minimum security confinement contributed to reduced general, but not to reduced sexual or aggressive reoffending. No relationship was found between level of temporary absence status (unaccompanied vs. accompanied) and recidivism. It is concluded that, contrary to public opinion and judicial practice, sexual offenders can be granted minimum security confinement and temporary absence if an adequate selection process is implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号